SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you allow specific vendors for being excluded from a GPO to prevent all removable storage devices?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. What is exFAT?
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
Sent across the network
Send email notifications
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
3. Why is PKi needed to encypt vpn traffic?
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
WPA-Personal (uses a preshared key)
4. How does Transparent Caching lead to improved end-user response times and decreased bandwidth consumption over the WAN links to the server?
A network location.
wbadmin.exe. This can backup critical files.
They need to be configured us use 802.1x RADIUS authentication
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
5. What is Sysprep?
Clear the content being cached
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
6. What are soft disk quotas?
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
They are monitored but not enforced. Users can exced there quota limit.
Not supported
WPA2 and 802.1x but require EAP-TLS to be enable.
7. What is the command to configure the preferred DNS server?
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
Windows 7 Professional.
8. What is User Account Control (UAC)?
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
9. Active directory DNS ____ replicate between forests.
Does not
4 (bits 53 - 56) /56 Allows for 16 regions
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
Yes
10. What is the name of the folder that stores all the system backup images?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. What is the cache.DNS file?
Pool Active Directory.
A file that is loaded when a DNS server starts up and populate the root hints.
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
Extensive Authentication Protocol used in PPP authentication.
12. What is DHCP conflict detection?
The DHCP server will ping an ip address before assigning it.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
Create persistent connections to computers with POWERSHELL
Pool Active Directory.
13. How do you add the Windows 7 VHD to the boot choices menu?
Problem history but also application installation history.
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
Use the BCDEDIT.EXE command
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
14. Are Migrated user accounts are enabled by default?
Who can shutdown a computer
No they are disabled
3389
On a core server
15. RRAS can be configured both in ______________.
IPV4 and IPV6
4 (bits 53 - 56) /56 Allows for 16 regions
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
DNS suffix search lists
16. What is DirectAccess?
Use the net sh command to configure the proper ports for remote management.
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
Enforce IPSEC on the network
17. How does transparent caching work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. What event viewer log is the Radius server (NPS) logs stored?
Disable AutoComplete in Internet Explorer
The local security logs.
It is a network health policy defines the minumum level of client health required to connect to the network.
Cannot be in different domains
19. What is a ESP?
DHCP server cannot assign an ip address
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
Encapsulating Security payload protocol used for encryption the packets created by the AH.
20. Can you choose which media libraries you want to share with your homegroup?
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
Yes
21. What happens if the router advertisement has the M flag set to 0 but the other staeful configuration (o) flag set to 1?
Not supported
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
vssadmin.exe. This can view previous version files as well.
DHCPv6 obtains additional configuration settigns.
22. What sites support Integrated Windows Authentication?
By using the dnscmd /zoneexport command.
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
Through a GPO.
Only sites added to the local Intranet Zones
23. You can configure process monitor alerts to _____.
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
Run scripts
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
24. What is WPA-PSK?
1723
WPA-Personal (uses a preshared key)
WIndows Update Server
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
25. How do you have a Firewall rule apply only to a specific computer?
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
wbadmin.exe. This can backup critical files.
26. What is WPA-EAP?
Delegate permission by configuring the dacl of the zone file.
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
WPA-Enterprise (radius authentication)
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
27. What is "Transparent Caching"?
Use dnscmd /zonerefresh.
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
28. What is NAP's security health validator?
It governs remote access and a user must meet the conditions of at least one of the policies.
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
A type of port forwarding that allows public network computers on a Private network through nat devises.
IPSEC
29. What is Internet Explorer Content Advisor?
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
Computer certificates be installed on client computers
30. Where is the Troubleshoot option for fixing common problems located?
Devices and Printers Control Panel applet has a
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
Windows Vista - Window 7 and Server 2008.
31. What does the NEW-PSSESSION powershell applet do?
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
Se a capture filter based on the mac address of the problem PC.
Create persistent connections to computers with POWERSHELL
32. The print management console can be configured to _____________.
Send email notifications
Create a customized shell
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
33. What does Cipher /X do?
You can allow by adding the device vendor's GUID to the allow list in a GPO.
Suggested Sites
WPA-Enterprise (radius authentication)
Use it to can backup certificates to a .PFX file that is password protected.
34. What does IMAGEX /MountRW do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. What do wireless access point need to be configured with to to preform 802.1x authentication?
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
They must be configured with the ip addresses of the radius server.
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
Comes with the Windows Automated Installation Kit (WAIK)
36. What does the MigUser.xml file do?
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
37. What is InPrivate Browsing?
It is a network health policy defines the minumum level of client health required to connect to the network.
DHCP server cannot assign an ip address
System Restore Points as well as Previous Versions of Files (configured through the System applet).
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
38. How do you enable a recovery agent?
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
Delete all the zone files or reinstall the DNS service.
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
39. Can Offline migration be performed on Windows 2000?
No
Create a customized shell
A OOBE ready and will be booted into Windows Welcome
From the Network Policy Access Services role in system manager.
40. What versions of Windows 7 support Bitlocker Drive Encryption?
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
DHCPv6 obtains additional configuration settigns.
Windows Aero was revised to be more touch-friendly.
41. What does "Create System Repair Disk" option do?
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
Run: Cscript slmgr.vbs /dl
42. What is a ns record?
No
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
It designates an authoritative DNS server - not the soa record.
43. How do you verify that an Auto Update Client is connecting to its WSUS Server?
Use the Programs and Features Control Panel applet to
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
44. What does Cipher /K do?
Migrates EFS encrypted files?
It will display driver signing status
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
Use it to generate an EFS user certificate
45. How do you configure IPSEC between two computers?
Use the Advanced Firewall to define Connection Security Rules.
Use it to generate an EFS user certificate
WPA2 and 802.1x but require EAP-TLS to be enable.
They are monitored but not enforced. Users can exced there quota limit.
46. How do you upgrade windows vista to windows 7?
Windows 7 Professional.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
On the zone file of the DNS server in the DNS manager.
47. What can Windows 7 Enterprise can be directly upgraded to?
The Default Programs Control Panel applet
an email address where the @ is replaced with a period.
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Windows 7 Ultimate.
48. What is a Subscription in event viewer?
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
It will display driver signing status
IN the WindowsUpdateClient log in the system log portion of event viewer.
49. Why would a secondary DNS server stop responding to client queries?
System Restore Points as well as Previous Versions of Files (configured through the System applet).
Modify/Create a GPO
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
Use it to can backup certificates to a .PFX file that is password protected.
50. How do you enable rdp on a core server?
Use the Cipher.exe command line tool.
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.